Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-25067

Опубликовано: 09 июн. 2022
Источник: ubuntu
Приоритет: medium
CVSS2: 6
CVSS3: 6.3

Описание

A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability.

РелизСтатусПримечание
devel

DNE

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

impish

ignored

end of life
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage
noble

needs-triage

oracular

ignored

end of life, was needs-triage

Показывать по

6 Medium

CVSS2

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 6 лет назад

A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability.

CVSS3: 6.3
nvd
больше 3 лет назад

A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Remote Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-143949 was assigned to this vulnerability.

CVSS3: 6.3
debian
больше 3 лет назад

A vulnerability, which was classified as critical, was found in Podman ...

CVSS3: 8.8
github
больше 3 лет назад

A vulnerability, which was classified as critical, was found in Podman and Varlink 1.5.1. This affects an unknown part of the component API. The manipulation leads to Privilege Escalation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

6 Medium

CVSS2

6.3 Medium

CVSS3